From: Nick Mathewson Date: Mon, 18 Nov 2013 18:26:58 +0000 (-0500) Subject: Tweak #10162 documentation a bit X-Git-Tag: tor-0.2.5.2-alpha~76^2 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ec9d88e5a219e4661aab05af56c78947c46cda99;p=thirdparty%2Ftor.git Tweak #10162 documentation a bit --- diff --git a/changes/prop157-require b/changes/prop157-require index 0c35f64d28..f04806ddd0 100644 --- a/changes/prop157-require +++ b/changes/prop157-require @@ -2,4 +2,4 @@ - Clients now reject any directory authority certificates lacking a dir-key-crosscert element. These have been included since 0.2.1.9-alpha, so there's no real reason for them to be optional - any longer. Completes proposal 157. \ No newline at end of file + any longer. Completes proposal 157. diff --git a/src/or/routerparse.c b/src/or/routerparse.c index 86917520cd..6d837159e1 100644 --- a/src/or/routerparse.c +++ b/src/or/routerparse.c @@ -1737,8 +1737,6 @@ authority_cert_parse_from_string(const char *s, const char **end_of_string) } tok = find_by_keyword(tokens, K_DIR_KEY_CROSSCERT); - /* XXXX Once all authorities generate cross-certified certificates, - * make this field mandatory. */ if (check_signature_token(cert->cache_info.identity_digest, DIGEST_LEN, tok,